Scenario: I buy old PC/laptops, fix it and then resell them. I recently got a laptop at an auction with the whole system password encrypted McAfee Endpoint Encryption. Windows does not even load. I ...

This question is very similar but also distinctly different (How do I ensure data encryption on Samba transmission on *NIX systems?)
I'm looking to set up remote access to a NAS unit locally sharing ...

My MS Word Add-In generates PDF preview of DOCX file on client PC and uploads both files to server. I cannot generate PDF on server.
Is there any way to make sure that the PDF is the printed version ...

My server generates an AES encrypted file which when downloaded acts as an input for an application. So, should I hardcode the symmetric key inside the application or should I randomly generate the ...

I need to create a system that allows a user to enter codes to charge an allowance. Embedded in this code should be the amount to charge the allowance.
The user would pay for a code which would then ...

Bob has a mistress. Her name is Alice. Bob`s wife Eve knows Bob is unfaithful, but she does not know who the mistress is. Alice does not know Bob is married.
Bob needs to communicate with Alice over ...

I have create an encryption of my one of the folder then it become green color, and automatically generated a folder on my DOCUMENT folder, but later I unfortunately deleted the folder, although I had ...

Say I want to encrypt the following text: "Today is March the 22nd, 2015". And say want to encrypt 8-byte blocks of data using the following permutation [6,3,0,1,5,7,2,4] to swap characters at those ...

Alice wants to send an encrypted message to Bob, but she also wants to connect to Carol's server. Are there any dangers associated with using the same RSA key for both PGP and SSH (other than a lack ...

I am a beginner when it comes to any EC algorithm, so please help me understand this basic question.
While reviewing the C# code, how can we find out the key-size used in the ECDH implementation? or ...

My professor stated that permutations which are done repeatedly does not further enhance security than just one permutation. He also stated that fact this applies to consecutive substitutions as well. ...

I'm looking for any way to digitally verify a user, ideally with a photo and link PII to that user.
My use case is that a user will extract and send an encrypted data blob (say from a passport) to my ...

Do clients use WPS every time when they connect to a WPS-enabled AP?
Or maybe they do it just the first time and then they switch to a normal WPA/WPA2 key exchange?
If the latter, it's possible for ...

I am integrating with multiple payment processors which have their set of public/private keys. This would be used in conjuction with per user keys, to bill clients.
I was wondering what is the best ...

I'm in a situation where I know that I have to decrypt a file encrypted using AES 256 CBC and I've the following details:
I know the first 16 bytes block in plain text
I know the IV (static 128 bit ...

I have a good working knowledge of basic security best practices (password hashing, preventing sql injection, CSRF, etc.) but am completely at a loss for finding a solution to common-case encryption ...

I am using Tresorit on Mac OS X and iPhone.
When I am using it there is always applied client-side encryption before posting the file to cloud. The key used for encryption is AES-256 and CFB mode of ...

I'm working in a PHP project and need a better solution to store credentials to a client's database, and I'm thinking about encryption, I put to work both gpg and openssl using asymmetric keys, but ...

This question is about a hypothetical in-memory web application that is used for exchanging encrypted messages that passively self-destruct in X amount of minutes.
Here the messages would be stored ...